Leveraging Flawed Tutorials for Seeding {Large-Scale} Web Vulnerability Discovery
T Unruh, B Shastry, M Skoruppa, F Maggi… - 11th USENIX Workshop …, 2017 - usenix.org
The Web is replete with tutorial-style content on how to accomplish programming tasks.
Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as …
Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as …
Validating security protocols with cloud-based middleboxes
CR Taylor, CA Shue - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Residential networks pose a unique challenge for security since they are operated by end-
users that may not have security expertise. Residential networks are also home to devices …
users that may not have security expertise. Residential networks are also home to devices …
[PDF][PDF] Poster: Precise detection of unprecedented python cryptographic misuses using on-demand analysis
While many research studies target Java cryptographic API misuses, similar issues within
the Python landscape are still uncovered. In this work, we provide 1) security guarantees for …
the Python landscape are still uncovered. In this work, we provide 1) security guarantees for …
ML-FEED: Machine Learning Framework for Efficient Exploit Detection
Machine learning (ML)-based methods have recently become attractive for detecting
security vulnerability exploits. Unfortunately, state-of-the-art ML models like long short-term …
security vulnerability exploits. Unfortunately, state-of-the-art ML models like long short-term …
[PDF][PDF] Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations
OAuth protocols have been widely adopted to simplify user authentication and service
authorization for third-party applications. However, little effort has been devoted to …
authorization for third-party applications. However, little effort has been devoted to …
Detecting proper SSL/TLS implementation with usage patterns
J Adeenze-Kangah, Y Chen - Journal of Physics: Conference …, 2019 - iopscience.iop.org
The importance of secure communication over the Internet cannot be overstated because of
the implications it has for ensuring privacy and safety for users. Much research has been …
the implications it has for ensuring privacy and safety for users. Much research has been …
Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks
R Safoine, S Mounir, A Farchi - 2018 6th International …, 2018 - ieeexplore.ieee.org
Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP)
networks, the use of VoIP services has significantly increased. Session Initiation Protocol …
networks, the use of VoIP services has significantly increased. Session Initiation Protocol …
Improving application security through TLS-library redesign
LS Amour, WM Petullo - … Conference on Security, Privacy, and Applied …, 2015 - Springer
Research has revealed a number of pitfalls inherent in contemporary TLS libraries. Common
mistakes when programming using their APIs include insufficient certificate verification and …
mistakes when programming using their APIs include insufficient certificate verification and …
All your credentials are belong to us: On insecure wpa2-enterprise configurations
In this paper, we perform the first multifaceted measurement study to investigate the
widespread insecure practices employed by tertiary education institutes (TEIs) around the …
widespread insecure practices employed by tertiary education institutes (TEIs) around the …
Towards best secure coding practice for implementing SSL/TLS
M Alhanahnah, Q Yan - IEEE INFOCOM 2018-IEEE Conference …, 2018 - ieeexplore.ieee.org
Developers often make mistakes while incorporating SSL/TLS functionality in their
applications due to the complication in implementing SSL/TLS and their fast prototyping …
applications due to the complication in implementing SSL/TLS and their fast prototyping …